Логотип exploitDog
product: "wordpress"
Консоль
Логотип exploitDog

exploitDog

product: "wordpress"
WordPress

WordPressсвободно распространяемая система управления содержимым сайта с открытым исходным кодом.

Релизный цикл, информация об уязвимостях

Продукт: WordPress
Вендор: Wordpress

График релизов

6.36.46.56.66.76.82023202420252026

Недавние уязвимости WordPress

Количество 1 894

github логотип

GHSA-25jw-j5g7-jrcc

больше 3 лет назад

WordPress version 4.9.8 and earlier contains a CWE-20 Input Validation vulnerability in thumbnail processing that can result in remote code execution due to an incomplete fix for CVE-2017-1000600. This attack appears to be exploitable via thumbnail upload by an authenticated user and may require additional plugins in order to be exploited however this has not been confirmed at this time.

CVSS3: 8.8
EPSS: Средний
github логотип

GHSA-pxcx-cprx-mr28

больше 3 лет назад

In WordPress through 4.9.2, unauthenticated attackers can cause a denial of service (resource consumption) by using the large list of registered .js files (from wp-includes/script-loader.php) to construct a series of requests to load every file many times.

CVSS3: 7.5
EPSS: Высокий
github логотип

GHSA-w8h5-qp6m-vfm9

больше 3 лет назад

In WordPress before 4.9.9 and 5.x before 5.0.1, contributors could modify new comments made by users with greater privileges, possibly causing XSS.

CVSS3: 5.4
EPSS: Низкий
github логотип

GHSA-33wf-jvrq-cxjv

больше 3 лет назад

In WordPress before 4.9.9 and 5.x before 5.0.1, when the Apache HTTP Server is used, authors could upload crafted files that bypass intended MIME type restrictions, leading to XSS, as demonstrated by a .jpg file without JPEG data.

CVSS3: 5.4
EPSS: Низкий
github логотип

GHSA-f844-ppv9-vxhv

больше 3 лет назад

In WordPress before 4.9.9 and 5.x before 5.0.1, crafted URLs could trigger XSS for certain use cases involving plugins.

CVSS3: 6.1
EPSS: Низкий
github логотип

GHSA-4mq7-pxfh-pjjv

больше 3 лет назад

In WordPress before 4.9.9 and 5.x before 5.0.1, the user-activation page could be read by a search engine's web crawler if an unusual configuration were chosen. The search engine could then index and display a user's e-mail address and (rarely) the password that was generated by default.

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-jgj7-cghf-2wq9

больше 3 лет назад

In WordPress before 4.9.9 and 5.x before 5.0.1, contributors could conduct PHP object injection attacks via crafted metadata in a wp.getMediaItem XMLRPC call. This is caused by mishandling of serialized data at phar:// URLs in the wp_get_attachment_thumb_file function in wp-includes/post.php.

CVSS3: 9.8
EPSS: Средний
github логотип

GHSA-j4jj-c644-q3fc

больше 3 лет назад

In WordPress before 4.9.9 and 5.x before 5.0.1, authors could bypass intended restrictions on post types via crafted input.

CVSS3: 6.5
EPSS: Средний
github логотип

GHSA-ccmp-622j-3xf7

больше 3 лет назад

Before WordPress 4.9.5, the URL validator assumed URLs with the hostname localhost were on the same host as the WordPress server.

CVSS3: 6.1
EPSS: Низкий
github логотип

GHSA-6f4p-6vw9-3q54

больше 3 лет назад

In WordPress before 4.7.5, there is a lack of capability checks for post meta data in the XML-RPC API.

CVSS3: 7.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
1
github логотип
GHSA-25jw-j5g7-jrcc

WordPress version 4.9.8 and earlier contains a CWE-20 Input Validation vulnerability in thumbnail processing that can result in remote code execution due to an incomplete fix for CVE-2017-1000600. This attack appears to be exploitable via thumbnail upload by an authenticated user and may require additional plugins in order to be exploited however this has not been confirmed at this time.

CVSS3: 8.8
28%
Средний
больше 3 лет назад
github логотип
GHSA-pxcx-cprx-mr28

In WordPress through 4.9.2, unauthenticated attackers can cause a denial of service (resource consumption) by using the large list of registered .js files (from wp-includes/script-loader.php) to construct a series of requests to load every file many times.

CVSS3: 7.5
88%
Высокий
больше 3 лет назад
github логотип
GHSA-w8h5-qp6m-vfm9

In WordPress before 4.9.9 and 5.x before 5.0.1, contributors could modify new comments made by users with greater privileges, possibly causing XSS.

CVSS3: 5.4
4%
Низкий
больше 3 лет назад
github логотип
GHSA-33wf-jvrq-cxjv

In WordPress before 4.9.9 and 5.x before 5.0.1, when the Apache HTTP Server is used, authors could upload crafted files that bypass intended MIME type restrictions, leading to XSS, as demonstrated by a .jpg file without JPEG data.

CVSS3: 5.4
3%
Низкий
больше 3 лет назад
github логотип
GHSA-f844-ppv9-vxhv

In WordPress before 4.9.9 and 5.x before 5.0.1, crafted URLs could trigger XSS for certain use cases involving plugins.

CVSS3: 6.1
5%
Низкий
больше 3 лет назад
github логотип
GHSA-4mq7-pxfh-pjjv

In WordPress before 4.9.9 and 5.x before 5.0.1, the user-activation page could be read by a search engine's web crawler if an unusual configuration were chosen. The search engine could then index and display a user's e-mail address and (rarely) the password that was generated by default.

CVSS3: 7.5
5%
Низкий
больше 3 лет назад
github логотип
GHSA-jgj7-cghf-2wq9

In WordPress before 4.9.9 and 5.x before 5.0.1, contributors could conduct PHP object injection attacks via crafted metadata in a wp.getMediaItem XMLRPC call. This is caused by mishandling of serialized data at phar:// URLs in the wp_get_attachment_thumb_file function in wp-includes/post.php.

CVSS3: 9.8
46%
Средний
больше 3 лет назад
github логотип
GHSA-j4jj-c644-q3fc

In WordPress before 4.9.9 and 5.x before 5.0.1, authors could bypass intended restrictions on post types via crafted input.

CVSS3: 6.5
11%
Средний
больше 3 лет назад
github логотип
GHSA-ccmp-622j-3xf7

Before WordPress 4.9.5, the URL validator assumed URLs with the hostname localhost were on the same host as the WordPress server.

CVSS3: 6.1
7%
Низкий
больше 3 лет назад
github логотип
GHSA-6f4p-6vw9-3q54

In WordPress before 4.7.5, there is a lack of capability checks for post meta data in the XML-RPC API.

CVSS3: 7.5
2%
Низкий
больше 3 лет назад

Уязвимостей на страницу


Поделиться